Please turn on your JavaScript for this page to function normally.
Secure practices for online shopping

As we prepare for Cyber Monday and a holiday season of increased online shopping, NCSA advises that everyone take a moment to practice safe cyber behaviors. These simple steps …

Week in review: Apple OS X sandbox hole, hiding messages in VoIP packets and U.S. water utility attack

Here’s an overview of some of last week’s most interesting news, podcasts, interviews and reviews Apple OS X sandbox hole allows bypassing of restrictions …

Cybercriminals to turn mobile phones into ATMs

With all of the crazy 2011 security breaches, exploits and notorious hacks, what can we expect for 2012? Researchers of the Websense Security Labs provide their top …

Most popular prohibited IT activities in the workplace

In spite of the fact that 74% of the interviewed IT professionals have already misused the company’s IT system, and could have lost their job, if a video recording could …

Tips for secure mobile payments

With the increased use of mobile devices to pay for goods and services, traditional wallets with cash and credit cards could one day be obsolete. A new ISACA white paper …

Create a Wi-Fi hotspot anywhere

TP-LINK announced two new Portable Wireless N Routers, designed to provide high-speed Internet access anywhere you go. Both routers are ideal for connecting tablet computers, …

Solutions for inspecting and securing SSL traffic

Fidelis Security Systems announced the SSL Decoder within Fidelis XPS, which provides the ability to assess the authenticity of an SSL certificate. They also introduced the …

Changing nature of DDoS attacks

The volume of packets-per-second (PPS) has almost quadrupled compared to Q3 2010, illustrating a significant increase in the size and diversity of DDoS attacks over the past …

Personal electronic signatures for everyone

DocuSign Ink helps consumers finish personal business faster by eliminating once and for all the hassles and costs of printing, faxing, scanning, and overnighting signed …

Change management leads to security breaches

75% of organizations believe their current change management processes could put them at risk of a security breach, according to Tufin. Having sampled 100 network security …

Why do companies backup infrequently?

Businesses are on average backing up to tape once a month, with one rather alarming statistic from the same survey showing 10 percent were only backing up to tape once per …

Teach children about online protection

In an effort to facilitate effective parent-child dialogue about Internet dangers, Trend Micro developed an eGuide with tips to help families have “The Talk” about …

Don't miss

Cybersecurity news